The RapidExpCart WordPress plugin through 1.0 does not sanitize and escape the url parameter in the rapidexpcart endpoint before storing it and outputting it back in the page, leading to a Stored Cross-Site Scripting vulnerability which could be used against high-privilege users such as admin, furthermore lack of csrf protection means an attacker can trick a logged in admin to perform the attack by submitting a hidden form.
References
Configurations
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e - Exploit |
Information
Published : 2023-05-15 13:15
Updated : 2025-01-24 21:15
NVD link : CVE-2023-0520
Mitre link : CVE-2023-0520
CVE.ORG link : CVE-2023-0520
JSON object : View
Products Affected
rapidexp
- rapidexpcart
CWE
No CWE.